F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamics,” International Journal of Information Security, pp. 69-83, 2002.
Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” Advances in cryptology-Eurocrypt 2004, Springer Berlin Heidelberg, 2004.
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, “Cryptographic key generation from voice,” Proc. of the 2001 IEEE Symposium on Security and Privacy, 2001.
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and V. Kumar, “Biometric Encryption,” ICSA Guide to Cryptography, McGrow-Hill, 1999.
A. Goh and D. C. L. Ngo, “Computation of cryptographic keys from face biometrics,” International Federation for Information Processing 2003, Springer-Verlag, LNCS2828, pp. 1–13, 2003.
F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively,” Computers, IEEE Transactions on, pp. 1081-1088, 2006.
R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, “Authentication by Keystroke Timing: Some Preliminary Results,” Santa Monica, CA: RAND Corporation, 1980.
BioPassword, “Authentication Solutions through Keystroke Dynamics,” BioPassword Whitepaper, 2007.
F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication,” Future Generation computer systems, pp. 351-359, 2000.
M. Karnan, M. Akila, and N. Krishnaraj, “Biometric personal authentication using keystroke dynamics: A review,” Applied Soft Computing, pp. 1565-1573, 2011.
S. Hwang, S. Cho, and S. Park, “Keystroke dynamics-based authentication for mobile devices,” Computers & Security, pp. 85-93, 2009.
P. Bours, “Continuous keystroke dynamics: A different perspective towards biometric evaluation,” Information Security Technical Report, pp. 36-43, 2012.
Y. Zhong, Y. Deng, and A. K. Jain, “Keystroke dynamics for user authentication,” Computer Vision and Pattern Recognition Workshops (CVPRW), 2012 IEEE Computer Society Conference on. IEEE, 2012.
K. Killourhy and R. Maxion, “The effect of clock resolution on keystroke dynamics,” Recent Advances in Intrusion Detection, Springer Berlin Heidelberg, 2008.
J. Daemen and V. Rijmen, “The Rijndael block cipher: AES proposal,” First Candidate Conference (AES1), 1999.
A. Cevallos, S. Fehr, R. Ostrovsky, and Y. Rabani, “Unconditionally-secure robust secret sharing with compact shares,” In David Point cheval and Thomas Johansson, editors, Eurocrypt 2012, Springer, pp. 195–208, 2012.
W. E. Burr, D. F. Dodson, and W. T. Polk, “Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology,” NIST Special Publication 800-63, Version 1.0.2, National Institute of Standards and Technology, 2006.
K. S. Killourhy and R. S. Maxion, “Comparing Anomaly Detectors for Keystroke Dynamics,” In Proc. of the 39th Ann. Int. Conf. on Dependable Systems and Networks (DSN-2009), Estoril, Lisbon, Portugal, pp. 125-134, 2009.